- Product: RSA Identity Governance & Lifecycle
- Versions: 6.8.x, 6.9.x, 7.x,8.x
- Component: Web Console
- Tool: Java
keytoolutility - Operating System: Linux
Browsers are throwing "Not Secure" while accessing the application
NOTE: The commands below use the following example placeholders — replace them with your actual values:
| Placeholder | Description |
your-server.example.com | Your server's FQDN |
your-alias.example.com | Any additional DNS alias for the server |
your-server-short | Short hostname |
your.server.ip | Server IP address |
your_keystore_password | Your keystore password |
your-server.example.com.csr | Your CSR filename |
- Log in to the application server as the
oracleuser. - Navigate to the keystore directory for your version:
For versions 6.8.x and 6.9.x:
cd /home/oracle/jboss-4.2.2.GA/server/default/conf/keystoreFor version 7.0.x:
cd /home/oracle/keystore - Back up the existing keystore before making any changes:
cp -fp aveksa.keystore aveksa.keystore.oriCAUTION: Do not skip this step. If the new keystore is invalid, you will need this backup to restore service. Verify the backup file exists before continuing:
ls -l aveksa.keystore.ori - Create a new keystore file and generate a new RSA 2048-bit keypair. When prompted for a password, enter
your_keystore_password(Av3k5a15num83r0n3):keytool -genkeypair -keysize 2048 -alias server -keyalg RSA -keystore my.keystore -dname "CN=your-server.example.com" -ext san=dns:your-server.example.com,dns:your-server-short,dns:your-alias.example.com,ip:your.server.ipCAUTION: The alias name must be
server. If any other alias name is used, the resulting keystore will not be recognized by RSA Identity Governance & Lifecycle and the web console will fail to start.NOTE: If you are running Java 6 (versions 6.9.x or lower), the
-extflag is not supported and will returnIllegal option: -ext. See the Notes section for the Java 6 workaround. - Generate a Certificate Signing Request (CSR) from the keypair. When prompted, enter
your_keystore_password:keytool -certreq -alias server -file your-server.example.com.csr -keystore my.keystore -ext san=dns:your-server.example.com,dns:your-server-short,dns:your-alias.example.com,ip:your.server.ip - Submit the CSR file (
your-server.example.com.csr) to your Certificate Authority (CA) for signing. The remaining steps assume your CA returns the following files:File Description cert.pemThe newly signed server certificate sub.pemThe issuing (intermediate) CA certificate root.pemThe root CA certificate - Import the root CA into the default Java truststore (
cacerts). When prompted, enter thecacertspassword (default:changeit):keytool -import -v -trustcacerts -alias root -file root.pem -keystore $JAVA_HOME/jre/lib/security/cacerts - Import the issuing CA into the default Java truststore (
cacerts):keytool -import -v -trustcacerts -alias sub -file sub.pem -keystore $JAVA_HOME/jre/lib/security/cacerts - Import the root CA into the new keystore. When prompted "Do you still want to add it to your own keystore? [no]:", type
yes:keytool -import -v -trustcacerts -alias root -file root.pem -keystore my.keystoreExpected output:
Certificate already exists in system-wide CA keystore under alias <root> Do you still want to add it to your own keystore? [no]: yes Certificate was added to keystore - Import the issuing CA into the new keystore:
keytool -import -v -trustcacerts -alias sub -file sub.pem -keystore my.keystore - Import the signed server certificate into the new keystore:
keytool -importcert -v -alias server -file cert.pem -keystore my.keystore - Verify the contents of the new keystore and confirm all entries are present (root CA, issuing CA, and server certificate):
keytool -list -v -keystore my.keystore - Confirm the file permissions and ownership of
my.keystorematch those ofaveksa.keystore:ls -l *.keystore - Replace
aveksa.keystorewith the new keystore:cp my.keystore aveksa.keystore - Set the correct ownership on the replaced keystore:
chown oracle:oinstall aveksa.keystore - Restart the RSA Identity Governance & Lifecycle services:
acm restart
Verification: Open a browser and navigate to the RSA Identity Governance & Lifecycle web console login page. Click the padlock icon in the browser address bar and confirm the new certificate is being presented, is trusted, and shows the correct SAN entries.
Reverting the Change
If the new certificate causes issues, restore the original keystore and restart services:
mv aveksa.keystore my.keystore
cp aveksa.keystore.ori aveksa.keystore
chown oracle:oinstall aveksa.keystore
acm restart
Notes
- Java 6 Workaround (Versions 6.9.x and Lower): The
-extflag used in Steps 4 and 5 to specify Subject Alternative Names (SANs) is not available inkeytoolfor Java 6. To work around this, perform Steps 4 and 5 on a separate machine that has Java 7 or Java 8 installed (e.g., a Windows workstation). Once the keystore (my.keystore) is complete, usescpor another secure file transfer method to copy it to the application server, then continue from Step 6. - Configuration File Locations by Version: The keystore and truststore locations referenced in this article are controlled by the following configuration files:
- Versions 6.8.x and 6.9.x (JBoss):
/home/oracle/jboss-4.2.2.GA/server/default/deploy/jboss-web.deployer/server.xml - Version 7.0.x (WildFly):
/home/oracle/wildfly/standalone/configuration/aveksa-standalone-full.xml
- Versions 6.8.x and 6.9.x (JBoss):
- Related Article: How to Update the Root (Server) and Client Certificates in RSA Identity Governance & Lifecycle — use this article if you need to update the certificates used for AFX Server and remote collection agent communication, not the web console certificate.
- Search Keywords: replace certificate, web server certificate, SSL certificate, TLS certificate, SAN, Subject Alternative Name, NET::ERR_CERT_COMMON_NAME_INVALID, aveksa.keystore, keytool, JBoss, WildFly, IMG, Aveksa, ACM, Via L&G, Identity Governance, IGL, certificate expired, certificate renewal.
Related Articles
How to Update the Root (Server) and Client Certificates in RSA Identity Governance & Lifecycle 2.23KNumber of Views RSA Authentication Manager Administration Server with Operations Console service fails to start when restarted from the SS… 1.68KNumber of Views Overview of using the Linux curl command to interact with the Web Services API in RSA Identity Governance & Lifecycle 683Number of Views The License/serial number being installed does not match the license/serial number stored on the server when installing an… 2.82KNumber of Views How to replace the RSA Authentication Manager self signed console certificate with a signed certificate from Microsoft Act… 1.6KNumber of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…